Aseem Jakhar, Nolen Johnson, Nir Tasher, Jason Meltzer and Tamara Schmitz examine how security research drives hardware risk decisions, timelines and supply chain accountability.
Security research increasingly defines how hardware products are designed, validated and sustained over long life cycles. As devices remain in market for years, vulnerabilities disclosed by independent and academic researchers can trigger cascading effects across supply chains, customer trust and operational risk. Hardware security teams must interpret research findings, assess real-world exploitability and respond within timelines that rarely align with software disclosure norms.
At the same time, researchers face obstacles in reporting issues, gaining access to modern platforms and understanding the constraints of remediation at scale. Progress depends on clearer communication, practical context and shared accountability across manufacturers, cloud providers and downstream users. Emerging pressures such as supply chain tampering and post-quantum readiness further raise the stakes for collaboration that balances transparency with resilience.
In this insightful discussion, the panel of experts will cover:
- Translating research findings into actionable hardware risk decisions;
- Disclosure timelines versus hardware development and remediation realities;
- Practical gaps between academic research and product security needs.
Here is the course outline:
How Security Research Shapes Modern Hardware Protection |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
